Open PeterMatula opened 6 years ago
Be careful with this, there will need to be an option to turn it off and the end address should not be trusted if code would fall through it.
Some malware has hidden instructions from IDA by editing the pdata end addresses: https://blog.talosintelligence.com/2017/10/disassembler-and-runtime-analysis.html
It looks like PE(+) files may contain
.pdata
section with info on functions in the binary:It is referenced by the exception table entry:
It would be useful to parse it.
Specification: https://msdn.microsoft.com/en-us/library/windows/desktop/ms680547(v=vs.85).aspx#the_.pdata_section
Example file: ack.zip
Also, search the PE specification for other similar structures that we are not currently handling.